ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From theory to practice"
☆16Aug 31, 2023Updated 2 years ago
Alternatives and similar repositories for tep-attack-simulator
Users that are interested in tep-attack-simulator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- jProxy 是一个 JAVA 编写的 HTTP 代理服务器类库,支持 HTTP、HTTPS、Websocket 协议,并且支持 MITM(中间人攻击),可以对 HTTP、HTTPS 协议的报文进行捕获和篡改。☆10Aug 9, 2024Updated last year
- Process-Aware Stealthy Attack Detection☆15Oct 17, 2018Updated 7 years ago
- DeepTraLog: Trace-Log Combined Microservice Anomaly Detection through Graph-based Deep Learning☆13Mar 24, 2023Updated 3 years ago
- UMASploit - ClearEnergy modules☆16Apr 14, 2017Updated 8 years ago
- program course for haidian fellowship☆10Apr 15, 2021Updated 4 years ago
- SetWinEventHook Sample☆50Sep 23, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆30Jun 26, 2023Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- Documentación sobre sistemas embebidos☆12Nov 15, 2024Updated last year
- Bits of Terraform that you can use to do bad things in CI/CD pipelines that run Terraform☆10Nov 10, 2020Updated 5 years ago
- Documentation and guidance to practice secure coding for various PLC vendors☆42Oct 27, 2023Updated 2 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Aug 1, 2023Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- Simple C++ Reverse Shell☆13Nov 22, 2022Updated 3 years ago
- 工控态势感知工具 Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks…☆10Sep 10, 2017Updated 8 years ago
- ☆11May 10, 2019Updated 6 years ago
- In this project, we implemented 7 interpretation techniques on two benchmark deep learning models "EEGNet" and "InterpretableCNN" for EEG…☆16Mar 15, 2022Updated 4 years ago
- Public Code for ICS Evasion Attack Generation☆44Apr 23, 2021Updated 4 years ago
- an exploit tool for Thinkcmf RCE vulnerable☆14Feb 5, 2020Updated 6 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆54Nov 21, 2024Updated last year
- ☆10Mar 4, 2026Updated 3 weeks ago
- Simple CVE-2021-20294 poc☆11Jan 21, 2023Updated 3 years ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- Documentation for the Curious Bolt hardware hacking multi-tool☆15Feb 1, 2024Updated 2 years ago
- Mac osx forensics tools☆12Nov 28, 2020Updated 5 years ago
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆17Mar 4, 2023Updated 3 years ago
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆11Jul 14, 2023Updated 2 years ago
- 渗透测试人员专用精简化字典 Dictionary for penetration testers happy hacker☆23Oct 10, 2020Updated 5 years ago
- Baby sleep guides curated from the best of the Internet.☆18Oct 19, 2014Updated 11 years ago
- CVE-2022-31245: RCE and domain admin privilege escalation for Mailcow☆12Jul 25, 2022Updated 3 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆12Oct 27, 2024Updated last year
- ☆12Jan 30, 2025Updated last year